You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/security/_snippets/private-url-struct.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,4 @@
1
-
* If you have a [custom endpoint alias](/deploy-manage/deploy/elastic-cloud/custom-endpoint-aliases.md) configured, you can use the custom endpoint URL to connect.
2
-
* If you don't have a custom endpoint alias, then use the following URL structure. This URL is built from endpoint information retrieved from your Elastic deployment and the private hosted zone domain name that you registered.
1
+
Use the following URL structure. This URL is built from endpoint information retrieved from your Elastic deployment and the private hosted zone domain name that you registered.
@@ -176,6 +177,7 @@ The mapping will be different for your region. Our production VPC Service for `u
176
177
After you create your VPC endpoint and DNS entries, check that you are able to reach your cluster over PrivateLink.
177
178
178
179
:::{include} _snippets/private-url-struct.md
180
+
:::
179
181
180
182
To test the connection:
181
183
@@ -184,7 +186,7 @@ To test the connection:
184
186
:::{include} _snippets/find-endpoint.md
185
187
:::
186
188
187
-
2. Test the setup using the following cURL command. Make sure to replace the URL with your custom endpoint URL, or with your deployment's endpoint information and the private hosted zone domain name that you registered.
189
+
2. Test the setup using the following cURL command. Make sure to replace the URL with your deployment's endpoint information and the private hosted zone domain name that you registered.
188
190
189
191
**Request**
190
192
```sh
@@ -215,13 +217,13 @@ Creating a private connection policy and associating it with your deployments al
215
217
* Record that you've established private connectivity between AWS and Elastic in the applicable region.
216
218
* Filter traffic to your deployment using VCPE filters.
217
219
218
-
Follow these high-level steps to add a private connection policy that can be associated with your deployment.
220
+
Follow these high-level steps to add a private connection policy that can be associated with your deployments.
219
221
220
222
1. Optional: [Find your VPC endpoint ID](#ec-find-your-endpoint).
221
223
2. [Create rules using the VPC endpoint](#ec-create-traffic-filter-private-link-rule-set).
222
224
3. [Associate the VPC endpoint with your deployment](#ec-associate-traffic-filter-private-link-rule-set).
223
225
224
-
#### Optional: Find your VPC endpoint ID [ec-find-your-endpoint]
226
+
### Optional: Find your VPC endpoint ID [ec-find-your-endpoint]
225
227
226
228
The VPC endpoint ID is only required if you want to filter traffic to your deployment using VCPE filters.
227
229
@@ -232,7 +234,7 @@ You can find your VPC endpoint ID in the AWS console:
232
234
:screenshot:
233
235
:::
234
236
235
-
#### Create a new private connection policy [ec-create-traffic-filter-private-link-rule-set]
237
+
### Create a new private connection policy [ec-create-traffic-filter-private-link-rule-set]
0 commit comments